Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 11:48
Static task
static1
Behavioral task
behavioral1
Sample
c6ffa7074b4b0bcda78e5649a60a25f48f80cbb6d71341eba9e33699a3450609.exe
Resource
win10v2004-20230220-en
General
-
Target
c6ffa7074b4b0bcda78e5649a60a25f48f80cbb6d71341eba9e33699a3450609.exe
-
Size
698KB
-
MD5
1d9edd70b0c7f551e9d77a951081b857
-
SHA1
3bac803b79eb5da4276e64c63c9b9a9b1895aedc
-
SHA256
c6ffa7074b4b0bcda78e5649a60a25f48f80cbb6d71341eba9e33699a3450609
-
SHA512
8f8e13b0629ef464dae8d84dc0d95b11ff00ae9d308591de523ae56cb86f38197cf47c2e044debb4c171131247587b050f18f23596ca836d23b38633d0ead54f
-
SSDEEP
12288:qMrey90koQ8L7+98mm4F0LROqfsiSIwjBdpL6uGGjWAxI9gAFGN6FWhMm:MyxkO8b42dvfCjBT2GjLI9z1Whb
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
muse
176.113.115.145:4125
-
auth_value
b91988a63a24940038d9262827a5320c
Signatures
-
Processes:
pro1214.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1214.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1214.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1214.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1214.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1214.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1214.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/4268-195-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/4268-194-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/4268-197-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/4268-199-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/4268-201-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/4268-203-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/4268-205-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/4268-207-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/4268-209-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/4268-211-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/4268-213-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/4268-215-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/4268-217-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/4268-219-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/4268-221-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/4268-223-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/4268-225-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/4268-227-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un578923.exepro1214.exequ7795.exesi888346.exepid process 1580 un578923.exe 2892 pro1214.exe 4268 qu7795.exe 4224 si888346.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro1214.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1214.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1214.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
c6ffa7074b4b0bcda78e5649a60a25f48f80cbb6d71341eba9e33699a3450609.exeun578923.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c6ffa7074b4b0bcda78e5649a60a25f48f80cbb6d71341eba9e33699a3450609.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c6ffa7074b4b0bcda78e5649a60a25f48f80cbb6d71341eba9e33699a3450609.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un578923.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un578923.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3728 2892 WerFault.exe pro1214.exe 4104 4268 WerFault.exe qu7795.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro1214.exequ7795.exesi888346.exepid process 2892 pro1214.exe 2892 pro1214.exe 4268 qu7795.exe 4268 qu7795.exe 4224 si888346.exe 4224 si888346.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro1214.exequ7795.exesi888346.exedescription pid process Token: SeDebugPrivilege 2892 pro1214.exe Token: SeDebugPrivilege 4268 qu7795.exe Token: SeDebugPrivilege 4224 si888346.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
c6ffa7074b4b0bcda78e5649a60a25f48f80cbb6d71341eba9e33699a3450609.exeun578923.exedescription pid process target process PID 3656 wrote to memory of 1580 3656 c6ffa7074b4b0bcda78e5649a60a25f48f80cbb6d71341eba9e33699a3450609.exe un578923.exe PID 3656 wrote to memory of 1580 3656 c6ffa7074b4b0bcda78e5649a60a25f48f80cbb6d71341eba9e33699a3450609.exe un578923.exe PID 3656 wrote to memory of 1580 3656 c6ffa7074b4b0bcda78e5649a60a25f48f80cbb6d71341eba9e33699a3450609.exe un578923.exe PID 1580 wrote to memory of 2892 1580 un578923.exe pro1214.exe PID 1580 wrote to memory of 2892 1580 un578923.exe pro1214.exe PID 1580 wrote to memory of 2892 1580 un578923.exe pro1214.exe PID 1580 wrote to memory of 4268 1580 un578923.exe qu7795.exe PID 1580 wrote to memory of 4268 1580 un578923.exe qu7795.exe PID 1580 wrote to memory of 4268 1580 un578923.exe qu7795.exe PID 3656 wrote to memory of 4224 3656 c6ffa7074b4b0bcda78e5649a60a25f48f80cbb6d71341eba9e33699a3450609.exe si888346.exe PID 3656 wrote to memory of 4224 3656 c6ffa7074b4b0bcda78e5649a60a25f48f80cbb6d71341eba9e33699a3450609.exe si888346.exe PID 3656 wrote to memory of 4224 3656 c6ffa7074b4b0bcda78e5649a60a25f48f80cbb6d71341eba9e33699a3450609.exe si888346.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6ffa7074b4b0bcda78e5649a60a25f48f80cbb6d71341eba9e33699a3450609.exe"C:\Users\Admin\AppData\Local\Temp\c6ffa7074b4b0bcda78e5649a60a25f48f80cbb6d71341eba9e33699a3450609.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un578923.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un578923.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1214.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1214.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2892 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2892 -s 10804⤵
- Program crash
PID:3728 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7795.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7795.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4268 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 13484⤵
- Program crash
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si888346.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si888346.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2892 -ip 28921⤵PID:928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4268 -ip 42681⤵PID:4440
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5b8f7d3bd6dc98a5e793372cdebef597c
SHA17af8430b241576c8aaee0bab1c1b42be0a3e2956
SHA256c87e3a64e21f1ebfee46dd1ec7d7c12792bfaeea8da6a6ed3b82111197b6ccd6
SHA512c769b5ee2c9d222a4bd5cb3b10dc0bf5e8527148d9daa96dc016147d6dd6a2bc5ab0548817c59d989bb573740d3ca6cd3c4c6d5e104115cdbb3cf559e7cf1b0a
-
Filesize
175KB
MD5b8f7d3bd6dc98a5e793372cdebef597c
SHA17af8430b241576c8aaee0bab1c1b42be0a3e2956
SHA256c87e3a64e21f1ebfee46dd1ec7d7c12792bfaeea8da6a6ed3b82111197b6ccd6
SHA512c769b5ee2c9d222a4bd5cb3b10dc0bf5e8527148d9daa96dc016147d6dd6a2bc5ab0548817c59d989bb573740d3ca6cd3c4c6d5e104115cdbb3cf559e7cf1b0a
-
Filesize
556KB
MD59e8e2560dd5b9d641fbaf20dd8176909
SHA18118579114fd57b74654942de04db8b20eb04274
SHA2566d1e9520b05197026c3231f10f0a25458880d0b71ecdfb5ac978e96943466ed8
SHA512ab48726771292fa7e74918dd8be9369e53fb081861aa1f23739e8fb38c4581a9fe2e8e61f39bab741c204d6817a33b6744a2ffdfbbefd26fc2e4089456cd7e8d
-
Filesize
556KB
MD59e8e2560dd5b9d641fbaf20dd8176909
SHA18118579114fd57b74654942de04db8b20eb04274
SHA2566d1e9520b05197026c3231f10f0a25458880d0b71ecdfb5ac978e96943466ed8
SHA512ab48726771292fa7e74918dd8be9369e53fb081861aa1f23739e8fb38c4581a9fe2e8e61f39bab741c204d6817a33b6744a2ffdfbbefd26fc2e4089456cd7e8d
-
Filesize
347KB
MD51f68c1a332369bea896904fe5c07cc3e
SHA11a8ae8217067134cb7a627721b935da81076da5b
SHA256576fd93ff7a6b4e0721accf67ba662749837ff067650eb172825e31eed95f003
SHA512b9f3054d93a5614ea3b318154c56f92a5a422e0a034231216d859cccdae68b33f022173a6cf044847f385069c0d9bf012a5418a39ef7b8603b90e373e1107cc1
-
Filesize
347KB
MD51f68c1a332369bea896904fe5c07cc3e
SHA11a8ae8217067134cb7a627721b935da81076da5b
SHA256576fd93ff7a6b4e0721accf67ba662749837ff067650eb172825e31eed95f003
SHA512b9f3054d93a5614ea3b318154c56f92a5a422e0a034231216d859cccdae68b33f022173a6cf044847f385069c0d9bf012a5418a39ef7b8603b90e373e1107cc1
-
Filesize
406KB
MD52d3b2a55db8543c9af06def2a89a3b43
SHA156f5f6c5d545d0ed49995cdd8380832b6115f7a8
SHA2564d39c60e65bc1b9ae22ea82949a61927a25ad4860cb919169aefa2f5adda16a5
SHA512989ad28a94bc5d7326572c4f6edd12325529659c53365033986cd14fa9f865793060f3c1f3e2383fd9f260e7f332deb44556bf849dee7957a5a086f08635ebc2
-
Filesize
406KB
MD52d3b2a55db8543c9af06def2a89a3b43
SHA156f5f6c5d545d0ed49995cdd8380832b6115f7a8
SHA2564d39c60e65bc1b9ae22ea82949a61927a25ad4860cb919169aefa2f5adda16a5
SHA512989ad28a94bc5d7326572c4f6edd12325529659c53365033986cd14fa9f865793060f3c1f3e2383fd9f260e7f332deb44556bf849dee7957a5a086f08635ebc2